Professional Documents
Culture Documents
CAT P2 Prelim English QP PHSG
CAT P2 Prelim English QP PHSG
2022
GRADE 12
PAPER 2: THEORY
MARKS: 150
TIME: 3 hours
3. Number the answers correctly according to the numbering system used in this question
paper.
4. Start EACH question on a NEW page.
7. In general, a mark is allocated per fact. A 2-mark question would therefore require TWO
facts, etcetera.
8. Read the questions carefully. DO NOT give more answers than the question requires as it
will NOT be marked.
9. All answers MUST be related to Computer Applications Technology.
10. Unless otherwise specified, answers such as 'cheaper', 'slower/faster', etc. will NOT be
accepted.
11. Do NOT use brand names in your answers, unless specifically required.
12. Write neatly and legibly.
Page 2 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
SECTION A
QUESTION 1: MULTIPLE-CHOICE QUESTIONS
Identify the correct answer from the list below each question. Write only the question number
and the correct capital letter next to it e.g. 1.10 A
1.1 The network in John's office building covers a small area. This type of network
is known as a …
A GAN.
B WAN.
C LAN.
D PAN. (1)
1.2 A comment in HTML code will appear … when the web page is displayed
in the browser.
A in brackets
B as a title
C nowhere
D after all the tags (1)
1.4 Which ONE of the following restricts unauthorised access to and from a
computer network?
A Password
B Cookie
C Modem
D Firewall (1)
1.5 Most disabled people need a customised solution for an input or output device.
Which one of the following is NOT an example of such a device, for a motor
controll disabled person?
Page 3 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
A Conditional formatting
B Functions and Formulas
C Graphs/Charts
D Comment (1)
1.7 Which ONE of the following is NOT a function that is available for calculations
in a Word table?
A AVERAGE
B COUNT
C SUM
D LEN (1)
A DIMM
B SOHO
C GIGO
D FOSS (1)
1.9 To print all comments and changes made in a document, the following must
be enabled in the Print dialog box.
A Only Print even pages
B Print Mark-up
C Scale to Paper size
D Print Selection only (1)
1.10 Which ONE of the following calculated fields will calculate value-added tax (VAT)
of 15% in a database query correctly?
A VAT= ["Price"]*0.15
B VAT: (Price)*0.15
C VAT= (!Price)*0.15
D VAT: [Price]*0.15 (1)
[10]
Page 4 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
Choose a term/concept from COLUMN B that matches a description in COLUMN A. Write only
the letter (A–S) next to the question number (2.1–2.10) in the ANSWER BOOK, for example
2.11 U.
[10]
COLUMN A COLUMN B
2.2 The ratio between the width and height of a screen. B Defragmentation
C Lookup wizard
2.3 A type of memory needed to store permanent data
and instructions. D Piggybacking
2.4 The problem that arises when different parts of files E Hacking
become scattered across the disk, causing the
F Overheating
computer to become slower.
G WAP
2.5 Input device in smartphones and tablets, used to
detect which way around the device is held or how it H Overclocking
is being moved.
I Contrast Ratio
2.6 A trend whereby all sorts of devices and appliances
are connected to the internet. J Aspect Ratio
2.7 Additional data stored about a file that describes the K ROM
contents of the file, such as the name of the author.
L RAM
2.8 A data type in Access that creates a list of options for
the user to choose from when entering data into that M Fragmentation
specific field.
N CSV
2.9 Preliminary (pre-sale) versions of software, released O IoT
by developers to be tested by the general public.
P Metadata
2.10 Gaining unauthorised access to and connecting to an
unsecured Wi-Fi network. Q Input mask
R Big data
S Beta software
[10]
Page 5 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
Indicate whether the following statements are TRUE or FALSE. Choose the answer and write
'true' or 'false' next to the question number (3.1 – 3.5) in the ANSWER BOOK. Correct the
statement if it is FALSE. Change the underlined word(s) to make the statement TRUE. (You
may not simply use the word 'NOT' to change the statement.)
EXAMPLES:
QUESTION ANSWER
3.1 The wild card character can be used in the Find and Replace feature of a word (1)
processor.
3.2 Archive is an utility that can be used to make more storage space available by (1)
deleting unnecessary files.
3.3 Broadband refers to the total amount of data transferred over an Internet (1)
connection in a given period of time.
3.4 Backward compatibility is an ability of software to open and use files created in (1)
previous (or older) versions of the software.
3.5 Green computing is the study and design of the workplace and the equipment (1)
used in the workplace for the comfort and safety of people in their work
environment.
[5]
TOTAL SECTION A: 25
Page 6 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
SECTION B
QUESTION 4: SYSTEMS TECHNOLOGIES
4.1 Study the following advertisement and answer the questions that follow:
Lenovo IdeaPad 3
Windows 11 Home | Microsoft Office 365 Personal
AMD Ryzen 3 3250U up to 3.5GHz Processor with
5MB Cache and 2x Cores
4GB DDR4 RAM 2400 MHz
512GB SSD
No DVD Drive included
15.6" FHD 1920 x 1080 Display
Integrated AMD Radeon Graphics
720p Webcam, Wi-Fi
1 x USB Type-C, 1 x HDMI Output
4.1.1 Identify the feature in the advertisement that indicates that it is a portable
computer. (1)
4.1.2 The processor in this advertisement has 2x cores. Explain why a processor
with two cores (Dual Core) would have a better performance than a single
core processor. (1)
4.1.3 Briefly explain why the CPU needs cache memory. (2)
4.2 An SSD is a storage medium best for storing operating systems, gaming apps,
and frequently used files where an HDD is a storage medium best for storing
extra data, such as movies, photos, and documents.
4.2.3 Which one of the storage mediums (SSD/HDD) is best suited for storage
of large quantities of data? (1)
Page 7 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
4.3 Every now and then your computer displays the following message:
4.3.2 Explain when the operating system will make use of virtual memory? (1)
4.4 There are many economic considerations when using computers in an insurance
company.
4.4.1 Besides switching off all computers at night, state TWO other ways in which
the electricity usage of computing devices can be decreased. (2)
4.4.2 Explain TWO ways in which the use of computers will be financially
beneficial for the insurance company. (2)
4.5 An incorrect statement was made on how use of an effective backup maintenance
program will prevent the hard drive from becoming fragmented.
Explain how defragmentation is different from making backups. (2)
4.6 Give TWO reasons why it is necessary to have an operating system installed on a
computer by referring to the functions of an operating system. (2)
4.7 Study the image below and answer the questions that follow:
[25]
Page 8 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
Page 9 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
6.2 Give TWO reasons why it would be better for the researcher to conduct a survey
online instead of using a hardcopy questionnaire. (2)
6.3 Give TWO ways to produce fewer, but more relevant results with a web search (in
general). (2)
6.4 A local hospital intends upgrading its security after an intruder impersonated a staff
member and attacked a patient while in their care. They intend implementing a
contactless Biometric Access control system.
6.5 Your educator discovered that your PAT Phase 1 appears exactly the same as the
information on the website and penalised you.
[10]
Page 10 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
7.2 Suggest a software accessibility option that will help a person suffering from tremors
when giving input to a computer. (1)
7.3.2 Discuss how a DDoS attack can be used by a Hacktivist group like
Anonymous to wage cyberwarfare against enemies, such as during the
Ukraine/Russia war? (2)
7.4 An E-learning app was developed to help train new employees to use the equipment
in the laboratory (see below).
7.4.1 What is the name of the technology used by this E-learning app? (1)
7.4.2 Explain why this technology will be more useful compared to watching a video
about the same equipment. (1)
7.5 Give TWO examples how Artificial Intelligence is used in our everyday lives.
Do NOT just list the names of apps. (2)
[10]
Page 11 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
8.1 Give TWO reasons for using the 'Save as' option in any program. (2)
8.2 List THREE elements, besides an image, that appear in most built-in cover pages,
in Word. (3)
8.3 Differentiate between the output of the <p> and the <br> tags in HTML. (2)
8.5 Your friend is working on a spreadsheet and is trying to calculate 50 minus 30 and
then divide the answer by 4. The answer he's getting is 42.5 instead of 5.
What's the most likely reason for the error AND how can it be corrected? (2)
8.6 Mail merge is commonly used to create labels in word processing. Consider the
screenshot below.
8.6.1 Besides using the 'Insert Merge Field' command repeatedly, what is the
better way to instantly insert the fields from the first label on all the other
labels? (1)
8.6.2 Suppose you've successfully inserted the fields on the other labels.
Describe the output one can expect to see if the <<Next Record>> rule was
not on all of the labels. (1)
8.7 Compare the difference between the purpose of a validation rule in a database
table and criteria in a query. (2)
Page 12 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
[15]
TOTAL SECTION B: 75
Page 13 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
SECTION C
QUESTION 9: INTEGRATED SCENARIO
The School Management Team asked you some questions about different technologies and the
progression of it, to have a better understanding. You must help them to understand ICT better
by answering the following questions:
9.2 Briefly explain why software and hardware are interdependent. (2)
9.4.1 Describe TWO advantages for using a Graphical User Interface rather
than a Command line system. (2)
9.5 File synchronization has grown increasingly important as businesses use the
cloud for collaboration.
9.6 One out of five websites uses cookies that are stored on people’s devices to help
remember information.
Page 14 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
9.7.2 Which Excel function will return an automatically updated date? (1)
9.8 Authentication is a safety measurement that can be used while doing business on
the Internet.
9.9 Blockchain is a new technology used in financial transactions. Explain how this
technology works. (2)
[25]
Page 15 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
Data privacy has become a worldwide concern. Governments are enacting laws to make sure
that citizens are protected.
10.1.1 Name the law used in South Africa to protect personal information. (1)
10.1.2 Give TWO examples how personal information can be misused. (2)
10.1.3 How can one restrict unauthorised access to a Word document? (1)
10.2 Give the generally accepted term that describes a process where a single idea or
business practice is funded by multiple small donations from volunteer
contributors, usually before the business venture is started. (1)
10.3 Digital currency is increasingly becoming common. China, Sweden, Saudi Arabia
and UAE are piloting the project.
10.4 Your school tasked you to design a website that will help to raise awareness of
digital privacy.
10.4.1 Explain how you are going to make sure that the website is user friendly. (2)
10.4.2 How would users in general know that a website is a secure site? (1)
10.4.3 Your image do not display on your website. You want the image
info.png display with a width and height of 200.
10.4.3.2 Name any other possible reason why an image will not display
(except in the coding itself). (1)
Page 16 of 17
Computer Applications Technology/P2 GDE/Preparatory Exam 2022
10.5 Internet of Things (IoT) is becoming popular and it is changing the way we live.
Quite a number of people are using IoT without knowing about potential problems.
10.5.1 Give a practical example of IoT being used in a smart home. (1)
10.5.2 Compatibility and Privacy are some of the concerns when using IoT.
Motivate the above statement. (2)
10.6.1 They want to know if a Primary Key is necessary? Explain the reason
for using a Primary Key in an Access table and suggest a suitable field
for a Primary Key. (2)
[25]
TOTAL SECTION C: 50
GRAND TOTAL: 150
Page 17 of 17